Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Psychology
Marketing
Graphic Design
Mindfulness for Wellbeing and Peak Performance
Whole genome sequencing of bacterial genomes - tools and applications
Competencias para buscar, mantener y promocionar en un empleo
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Bug-Bounty is a process where hacking companies, or hackers, act as 'middle-men' to detect bugs in software and address cyber vulnerabilities that organisations are facing. Get an hand-on approach on hunting bugs.
Learn the basics of Penetration Testing and get introduced to Web Application penetration testing with this course that is a part of the open source cybersecurity training initiative.
HackerSploit's online program offers a comprehensive guide to malware analysis, from setting up a sandbox environment to creating YARA rules. Duration: 3-4 hours.
HackerSploit offers a 1-2 hour training on BlackArch Linux installation, configuration for penetration testing, and VMware tools usage.
Learn to use ChatGPT for cybersecurity with HackerSploit's concise guide, covering pentesting, generating shells, fuzzing, and more in under an hour.
Learn Metasploit basics from HackerSploit in under an hour. Ideal for beginners, this program covers security vulnerabilities, penetration testing, and IDS signature development.
DNS Enumeration Tutorial - Dig, Nslookup & Host.Maltego - Automated Information Gathering.Information Gathering With Shodan.Shodan Search Engine Tutorial - Access Routers,Servers,Webcams + Install CLI.
Learn to perform host discovery and vulnerability scanning with Nessus in less than an hour with HackerSploit.
Learn to identify network intrusions using Snort rules in under an hour with HackerSploit. Gain skills in capturing traffic and detecting malicious activity.
Learn web app penetration testing with HackerSploit's 12-hour program. Master tools like Burp Suite, ZAP, and OWASP Juice Shop, and explore topics from brute force to XSS and SQL injection.
Linux Essentials: Curl Fundamentals. UFW Firewall (Uncomplicated Firewall) - Complete Tutorial. How To Clear Tracks & Logs On Linux.SSH Brute Force Protection With Fail2Ban.How To Create Your Own Pentesting Distribution.
Learn Python3 for penetration testing with HackerSploit. Develop TCP servers, clients, Nmap scanners, port scanners, and banner grabbing scripts in 1-2 hours.
Learn web app penetration testing with HackerSploit in under an hour, including setting up Burp Suite and understanding CSRF.
Learn to set up your own penetration testing distribution using open-source frameworks with HackerSploit. Less than 1-hour material.
HackerSploit offers a concise guide on securing Docker daemon with TLS encryption and user namespaces, including a practical demonstration. Less than 1-hour workload.
Get personalized course recommendations, track subjects and courses with reminders, and more.